FORMAL MODELS FOR COMPUTER SECURITY

被引:14
|
作者
LANDWEHR, CE
机构
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:247 / 278
页数:32
相关论文
共 50 条
  • [11] Mathematics, technology, and trust: Formal verification, computer security, and the US Military
    MacKenzie, D
    Pottinger, G
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 1997, 19 (03) : 41 - 59
  • [12] Validation of computer models for homeland security purposes
    Schweppe, John E.
    Ely, James H.
    Kouzes, Richard T.
    McConn, Ronald J., Jr.
    Pagh, Richard T.
    Robinson, Sean M.
    Siciliano, Edward R.
    Borgardt, James D.
    Bender, Sarah E.
    Earnhart, Alison H.
    2005 IEEE NUCLEAR SCIENCE SYMPOSIUM CONFERENCE RECORD, VOLS 1-5, 2005, : 297 - 301
  • [13] Formal Models for Analyzing Security Protocols: Some Lecture Notes
    Cortier, Veronique
    Kremer, Steve
    DEPENDABLE SOFTWARE SYSTEMS ENGINEERING, 2016, 45 : 33 - 58
  • [14] Safe abstractions of data encodings in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 125 - 167
  • [15] The new topicality of using Formal Models of Security Policy within the security engineering process
    Koob, F
    Ullmann, M
    Wittmann, S
    APPLIED FORMAL METHODS - FM-TRENDS 98, 1999, 1641 : 302 - 310
  • [16] Enabling Security Checking of Automotive ECUs with Formal CSP Models
    Heneghan, John
    Shaikh, Siraj Ahmed
    Bryans, Jeremy
    Cheah, Madeline
    Wooderson, Paul
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2019, : 90 - 97
  • [17] Formal affordance-based models of computer virus reproduction
    Webster, Matt
    Malcolm, Grant
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (04): : 289 - 306
  • [18] Teaching Formal Methods in Application Domains A Case Study in Computer and Network Security
    Brucker, Achim D.
    Marmsoler, Diego
    FORMAL METHODS TEACHING, FMTEA 2024, 2024, 14939 : 124 - 140
  • [19] Soundness conditions for message encoding abstractions in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 72 - 79
  • [20] Economic models and approaches in information security for computer networks
    Sklavos, Nicolas
    Souras, Panagiotis
    International Journal of Network Security, 2006, 2 (01) : 14 - 20